Intelligent Strategies for 21st Century Broadband and Cyber Infrastructure Security

Size: px
Start display at page:

Download "Intelligent Strategies for 21st Century Broadband and Cyber Infrastructure Security"

Transcription

1 Intelligent Strategies for 21st Century Broadband and Cyber Infrastructure Security Dr. Emmanuel Hooper Senior Scholar and Researcher Cyber, Broadband and Intelligent Security Harvard University, Leadership for Networked World Harvard-MIT-Yale Cyber Scholar Founder, Global Information Intelligence or 1 Introduction 1.1 The Challenges Facing Broadband and Cyber Networks This research is pertinent to recent 21st cybersecurity challenges and the FCC broadband plans to gather data-driven information on how the public safety community can best utilize broadband technologies towards preparation, response, and recovery from major disasters, pandemics, acts of terrorism, and cyber attack. This includes challenges of broadband and cyber security for the FCC, Cyber Coordination Executive, National Cyber Study Group (NCSG), Director of National Intelligence (DNI), and Comprehensive Cybersecurity Initiative (CNCI). The acceleration of high speed broadband networks using wireless, Wi-Fi, and emerging WiMAX and their interconnection to cyber infrastructures present many critical challenges. It is vital that in the proposed Broadband plan being presented to Congress by the FCC that continuous research and study of the impact of relevant issues are discussed. These include the challenges of high speed data transmission at high frequencies and speeds in the Gigabits range that transfer eventually terabytes of data across multiple interfaces to wireless and fiber networks that interconnect to the global Internet. In the midst of the emerging challenges for 21st century US Cyber Security, broadband data transmission and its intersection critical US infrastructures present many issues that require detailed on-going research. This includes broadband distribution, access controls, security, monitoring, intrusion detection and prevention, response and forensic evidence for traceability, sustainability of effective use and management. Among the many challenges ensuring responsible broadband use, distribution and management is monitoring astute interceptions of high-speed traffic at various segments of the broadband infrastructures that interface with US cyber and global networks that transmit high-speed data in real time. The challenges here include identification of legitimate traffic, understanding the levels of appropriate thresholds for traffic on broadband networks, and ensuring effective cryptographic key management, ciphers and algorithms are adaptable to handle astute interceptions, evasions and insertions. Additional challenges include congested networks and packets in backbones of cyber networks due to the rapid increase in the number of users, types of services, multi-functional applications, and meta data aggregation servers in regional and global data centers. Furthermore, coupled 1

2 with the increasing trends of parsing, loading and transforming government, corporate, public and private data at high speeds between laptops, PDUs and Data Centers, the interception of high speed packets can easily evade detection and appropriate response in real-time. 1.2 Emerging Challenges for Broadband and Cyber Security While availability and rapid dissemination of high-speed digital networks has been a major focus of consumers and other advocates, the lessons of attacks on cyber networks, and over 5,000 categories and subcategories of attacks should cause 21-century policy makers prioritize on effective broadband traffic distribution and security. Security software and hardware have increasing vulnerabilities due to the lack of strategic design for adaptable performance for threat mitigation and ineffective anti-hacking code security standards. Coupled with the multi-functionality, security applications and lack intelligent data mining to detect and respond to astute hackers who operate in stealth mode using broadband networks to penetrate Virtual Private Networks (VPNs), dedicated global backbones and cyber infrastructures. The major challenges for broadband use, distribution, dissemination and integration with emerging cyber infrastructures include the vulnerabilities in software, hardware, operation systems, applications, databases, routers, firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Intrusion Response Systems (IRS), log aggregation mechanisms, event correlation, parsing and correlating rules, rule induction, hybrid algorithms, intelligent data mining, forensic evidence data acquisition and analysis of broadband high speed data. The attacks are well beyond Distributed Denial of Service (DDOS), buffer overflows, cross-site scripting or cross-reference scripting in application security for broadband traffic. Specially designed attacks using embedded stealth software and malware, and crafted by rogue interceptions of broadband signals crossing backbones of cyber traffic has challenged and evaded many Internet Service Providers (ISP). Additional challenges facing broadband traffic includes the emerging trends in data aggregation, using security event and incident management software and Meta or Master Data Management (MDM) at regional, national and global centers. This implies that very sensitive data are transmitted at high speeds into centralized storage. There are several problems posed by such trends. Since broadband traffic is traveling at high speeds, real-time the detection and response to attacks versus false positives, or normal traffic versus abnormal traffic can be ineffective. This implies that increasing reliance on automated software, which largely depend on rudimentary rules rather than hybrid adaptable algorithms, make the task of broadband traffic management both inefficient and ineffective. Furthermore, increasing challenges include man-in-the-middle interceptions at interfaces of broadband traffic across wireless, Wi-Fi, WiMAX, and autonomous backbones that interface with secured interfaces. Even passphrases of 128 characters, and encrypted data can be readily decrypted using forensic tools using astute techniques. 1.3 Current Approaches and Their Problems Current methods for detecting broadband attacks and malicious activities lack effective collaborative responses [3, 15, 32, 28], due partly to increase in volumes of normal traffic [15, 32, 36]. This includes exponential increase in packet rates from astute attacks on fast broadband networks, VPNs and Internet and autonomous backbones [8, 27, 32, 34, 37]. 2 New Intelligent Strategies for 21st Century Broadband and Cyber Security Intelligent and strategically new approaches are required to meet the rapidly emerging challenges and threats for broadband technology, traffic, networks and cyber security in the 21st century. The multifunctional features in emerging software and hardware designed for broadband users, also offer the ca-

3 pability for astute users to utilize these functions to spy, evade detection, engineer stealth attacks and even prevent traceability in real-time. Most of the real-time event analyzers are incapable of tracking astute real-time attacks due to increasingly aggregated data without effective hybrid algorithms consisting of adaptable pattern recognition and matching for handling astute event anomalies. Thus in broadband speeds, short-term attacks of insertions and intermittent stealth evasions are readily concealed, since the gigabytes of exchanged traffic at high speeds are aggregated to terabytes stored data, lacking effective hybrid data mining techniques to filter out feature attributes for responding to astute broadband threats in real-time. This implies strategic intelligent algorithms, for access controls, dissemination, adaptability and rapid response to broadband cyber threats and counterintelligence. Research indicates that the amount of traffic exceeds terabytes per second at many ISPs, data centers, corporate and public networks that use broadband via wireless, Wi-Fi, or fiber networks to interconnect to their local, regional, national and global networks. Furthermore, the transmission of broadband traffic over secured WiMAX, present challenges of internal traffic security. Astute hackers evade access control systems using patterns of infrequent attacks to conceal penetration into centralized data at traffic speeds of Gigabits/second. At such speeds an IDS, IPS, IRS, Security and Event Management Systems, Log Aggregation and Correlation Systems, are vulnerable to false positives and false negatives. 1. Effective detection and monitoring techniques for US Cyber transfers of highly sensitive data: First, embedded monitoring and filtering detection mechanisms, techniques, countermeasures and counter-intelligence strategies against evasive interception of highly sensitive data, consisting of private, confidential and personally identifiable information for customers, consumers and products at intermediary points of US Cyber critical infrastructures. 2. Specification of new privacy and controls for secure data transmission: Secondly, specification of new privacy definitions and control requirements in categories, subcategories and attribute types for secure transmission against interception of highly sensitive data and to ensure that information flow of highly sensitive data in complex systems comply with newly derived security and privacy policies and procedures. 3. Validation and verification techniques for effective privacy controls for secure data transmission: Thirdly, techniques for validation and verification of effective implementation of these privacy specification controls based on new monitoring techniques for enforcement of security and privacy controls transparency, auditability, traceability accountability and traceability and cyber forensics and breaches assessments and notifications and preventions in critical infrastructures, applications and databases. These implies the design of new security control mechanisms that specifies new security, privacy includes new terms, need-to-validate and need to-verify adequate effective controls and validation evidence for security and privacy of highly sensitive data across broadband and cyber critical infrastructures. 2.1 Intellectual Merits The intellectual merit of the research includes contributions to research and development of effective solutions to the major emerging and rapidly increasing problems of intelligent broadband and cyber attacks, most of which evade detection in complex infrastructures carrying data-intensive applications. This research will enhance understanding, analysis and effective design of complex infrastructures operating in the context of cyber security and protection design. Effective approaches for secure transmission of highly sensitive data, carrying private, confidential and personally identifiable and customer

4 and product class. This includes privacy controls and trustworthy transaction processing, security policy specification, discovery, and implementation, and generation of automatic of security configurations and responses from abstract security policies and control specifications for international data transfer controls implementation, and detection and responses to counter measures against interception of highly sensitive data, carrying private, confidential and personally identifiable and customer and product class information at intermediary points. This includes effective cybersecurity and protection design, and intelligent strategies for complex network infrastructures that transfer very sensitive personally identifiable information. 2.2 Broader Impacts The broader impacts resulting from the research include effective 21st century solutions for US broadband and cyber security, FCC regulations, DHS, DNI, DOD,DARPA, IARPA, DHSARPA, etc. This involves effective solutions to the challenging and rapidly increasing problems of evasive and intelligent cyber attacks that face cyber security and protection design, complex network infrastructures which carry data-intensive applications across the Internet. Furthermore, the broader merit of the research results will be efficient, resilient, robust, scalable, adaptable, accurate and provide effective intelligent counter-attack solutions, involving both real-time responses and off-line for forensic analysis for current and future research on the design and effective implementation of broadband and complex network infrastructure security and data-intensive applications across the internet. This includes discovery, understanding teaching, training and learning and broadens participation of underrepresented groups including various gender, ethnicity and geographic regions. Benefits to Society includes solutions of the major problems of cybersecurity, cyber-crime, counter-terrorism, identity theft, US Cyber data transfer of data on the Internet, industrial data and applications and education. This includes Partnership with academic scientists, staff at federal agencies and with the private sector on both technological and scientific national projects and interpretation of research and education results in formats understandable and useful for non-scientists and provide information for policy makers and formulation by International, federal, State and local agencies on regulations on Internet security, cyber crime and countermeasures. 3 Analysis of Previous Work The approach for solving the problem of benign and suspect network traffic [10] has focused on attacks at the perimeter of the network, which is the boundary between the external routers and the Demilitarized zones (DMZ). The DMZ consists of hosts, which provide various services designed for public access (hosts from external network). The DMZ is separated from the internal network via firewalls and security controls in order to restrict public access to the internal network. These perimeters receive significant attacks of Distributed Denial of Service (DDOS) attacks, including DDOS passwords attacks, DDOS brute force and malware, and astute attacks. These are aimed at bypassing firewalls, IDSs and VPN interface routers and gateways to internal VPN servers in order to access highly sensitive data. Attacks and interception and eavesdropping of highly sensitive data occur at perimeters and also at internal interfaces to US Cyber routers, and backbones of external networks and the Internet. 3.1 Limitations of Detection Systems, Tools and Techniques Major problems in various IDSs and intrusion detection tools include generating false positives and false negatives, accumulating benign traffic and low detection accuracies, especially in broadband network infrastructures environments. Moreover, IDSs are vulnerabilities to hackers and inefficient in their handling of benign traffic and responses to attacks [20, 37, 45]. In addition, various IDSs, using largely

5 signature detection mechanisms, face the problems of accurate detection in real-time and presenting appropriate responses for containment and mitigation of broadband network infrastructure attacks. For example, IDSs which handle large data sizes, ranging between several Megabits to several Gigabytes per second, also drop packets and decrease in detection accuracy as packet rate increase [20]. This includes network IDSs such as Intrushield IDS [32, 32], Realsecure [30], NetRanger [4], Blackice [29], snort [39], Bro [34] and NFR [33, 38], Graph-based IDS (GR-IDS) [43], NetSTAT [48], Quicksand [23, 24] and SPARTA [23]. 3.2 Distinguishing between malicious and random benign broadband traffic Other IDS tools are incapable of clearly distinguishing between malicious connections and random but normal variations in broadband traffic patterns. Thus, they are subject to significant false positives and false negatives. This includes host IDSs such as DIDS (Distributed IDS) [41], Intrusion Detection Agent (IDA) [1], SWATCH [12], COAST [25] and USTAT [19]. Furthermore, detection systems that aim to respond to alerts do not adequately determine the real status of the alerts before attempting to provide any response. Thus they do not provide effective responses based on corresponding rigorous traffic analysis. Thus they mistakenly respond to alerts that have significant false positives. This includes NAI [32, 31], Realsecure [30], NetRanger [4], Blackice [29], NFR [33, 38], Netstat [48], STAT [47] and SWATCH [12]. Similarly, IDS tools that attempt to provide some responses have limitations due to the specificity or over-generalization of their model of the signature patterns. Thus, they are unable to determine the real status of a wide variety of alerts. This includes Norton Internet Security [44], Intrusion Detection Agent (IDA) [1], Intrusion Detection Alert [35], CITRA [9], IDIOT [26], INSA [46] and Ji Nao [21]. In summary, none of these detection tools and techniques provides feedback mechanisms along with rigorous statistical analysis. Analysis of detection strategies for various traffic types indicate that both anomaly and misuse detection are relevant. 3.3 Analysis of strategies for detection and response to different broadband attacks In order to generate appropriate responses to suspect packets at the perimeter, various strategies are required for analysis and detection of different broadband attack types. Appropriate responses should correspond to the various packet types whose attributes require analysis, prior to their development and implementation. Attack types are now more complex due to the proliferation of applications and network systems and their associated vulnerabilities [10, 22]. 4 Architecture 4.1 Highly Sensitive Broadband Traffic Data Mining on Autonomous Network Interfaces and the Internet This involves strategic traffic interception, filtering and monitoring of broadband traffic on wireless, Wi-Fi, WiMAX, Autonomous Networks and Internet Interfaces routers, VPNs and backbones. The strategic response approach involves the prototype design for monitoring and filtering traffic for specific attribute features of packets and malicious traffic from VPNs, firewalls and IDSs. The packets are diverted for analysis in the data mining analysis database hosts. An example of strategic architecture for monitoring, filtering and data mining of highly sensitive information from multiple VPNs, firewalls and IDS is shown in Figure 1.

6 VPN IP Address: VPN Mail Exchange Remote Site 2 Traffic ACS Subnets Data Center traffic Other VPN sites traffic VPN Firewall Hosts Remote Site 3 Traffic NAT IP Addresses IP Address to Service Provider s IP Address Architecture for Highly Sensitive Information Datamining: Strategic Traffic Interception, Filtering and Monitoring on VPN, Autonomous Networks and Internet Interfaces IDS External Internetworks Backbones, Networks, Hosts External backbones networks subnetworks routing protocols traffic packets types Local Firewall LAN /WAN Hosts Hosts Remote Users LAN/WAN External Packet Filters Traffic Incoming/Outgoing Packet Filters Remote LAN Private Local Firewall /WAN LAN/WAN ACS router Traffic Incoming/Outgoing Packet Filters Remote Site LAN Local Firewall Private /WAN VPN IP LAN/WAN VPN Traffic Incoming/Outgoing Packet Filters VPN- sites Network Zones for Datamining Incoming/Outgoing Packet Filters Private Local Firewall Private LAN/WAN Incoming/Outgoing Packet Filters Traffic Local Firewall Global Networks Traffic LAN /WAN LANs /WANs Traffic Hosts Hosts Hosts Users Remote Users Remote Users Remote Users Policies Packets Protocols Policies Packets Protocols Policies Packets Protocols Policies Packets Protocols Policies Packets Protocols Internal Backbones Networks Subnetworks Routing protocols Traffic Packets Types 6nsf.pdf Multiple VPNs, Firewall, IDS and Au- Figure 1. Data Mining of Highly Sensitive Data: tonomous Network Interfaces

7 This shows multiple firewall zones for local and remote sites within the VPN carrying broadband traffic. The external traffic is separated from the internal network through the Private Internet Exchange (PIX) firewall [6]. The firewall is placed in internal and external switch interfaces in the DMZ to isolate the external traffic from the internal traffic. This includes multiple firewalls for local and remote sites within the Virtual Private Network (VPN). The local and remote routers isolate traffic between the LANs, MANs and WANs. The remote firewalls track access violations within these zones, while the local firewalls trace and respond to attacks in the DMZ and the internal network. 5 Research Methods The research method consists of developing new and effective embedded monitoring and filtering detection mechanisms, techniques and countermeasures against evasive interception of highly sensitive data, consisting of private, confidential and personally identifiable information for customers, consumers and products at intermediary points of US Cyber critical infrastructures. Secondly, the specification of new privacy definitions and control requirements in categories, subcategories and attribute types for secure transmission against interception of highly sensitive data and to ensure that information flow of highly sensitive data in complex systems comply with newly derived security and privacy policies and procedures. Thirdly, the development of new and effective techniques for validation and verification of effective implementation of these privacy specification controls based on new monitoring techniques for enforcement of security and privacy controls transparency, auditability, traceability accountability and traceability and cyber forensics and breaches assessments and notifications and preventions in critical infrastructures, applications and databases. 5.1 Data Mining of Broadband Traffic in Autonomous and Cyber Networks The autonomous networks route packets from broadband traffic and multiple backbone networks via the Internet. However, these autonomous broadband networks also are vulnerable to attacks from hackers. The multiple firewalls, subnets strategically isolated to divert traffic into different zones for analysis. The additional backbones for the US Cyber networks supply further traffic to the VPN. Thus the additional traffic between the local site VPN, the remote VPN site and the remote Private LAN/WAN sites is filtered using the local firewall router at each site. The cumulative traffic is diverted to the Data Mining Database Hosts (DDH) for analysis and the results are sent to the IDS for responses based on their statuses. This ensures that any hackers attempting to penetrate the local VPN using the remote sites are denied access to the VPN. The additional remote traffic is controlled, segregated and filtered using Cisco Secure Access Control Servers (ACS) [7] routers to prevent access to sensitive segments of the internal VPNs. 5.2 Highly Sensitive Information Broadband Traffic Interception, Filtering and Data Mining This involves using multiple firewalls for local and remote sites within the Virtual Private Network (VPN) to intercept, filter and perform hybrid data mining on broadband traffic. These critical segments of network infrastructures include the VPN and the local sites, private networks within the VPN, including local and remote sites in the VPN that share private data subnets, and thus unique private networks within the VPN. Each subnet is designed with a range of IP addresses, corresponding subnet mask and default gateway. These separate traffic for efficient log management and traceability of the packet as it traverses multiple zones between source and destinations. It also prevents the packet from loading the network and provides means for its isolation and analysis using packet filters for each zone. The packet from each zone

8 is diverted to the DDHs for analysis. Remote traffic to the VPN using the Cisco Access Server (AS5301) via Remote Authentication Dial In User Service (RADIUS) [5] is diverted to the DDHs for analysis of potential malicious traffic. This prevents malicious packets from using backdoor access to the internal network through dial-up access or remote VPN firewall access. The traffic in the various zones and VPN zones is analyzed through the DDHs for potential malicious packets. In order to provide efficient management of the traffic volume, the patterns of the traffic are examined for similar packets using the data mining techniques. These are used to filter similar patterns of traffic which are subsequently diverted to the DDHs. This implies that the DDHs focus on examining new malicious traffic and the IDS filters out any previously known patterns from its alert monitor. Thus repetitive well-known benign traffic is filtered and permitted access to their destinations and known attacks are diverted to the IDS for denial of access to their intended destinations. This strategy reduces traffic in the DDH hosts and enables efficient management of packets entering or leaving the multiple zones of the network infrastructure. 6 Intelligent Broadband Infrastructure Protection Strategy for Highly Sensitive Data We analyzed real broadband network traffic in a commercial environment consisting of Intrushield IDS [32]. The experiment consists of alert data collection and analysis in a network environment comprising the following architecture (see Figure 2). The IDS consists of Network Associates Intrushield (NAI), IDS [32] for detecting attacks from external traffic, located at the Demilitarized Zone (DMZ), IDS-DMZ, and two main internal IDSs (NAI-I-4000 IDS), which detect internal attacks (IDS-4001 and 4002). The IDS sensors monitor traffic at 600 megabits per second and the I-4000 IDS sensors monitor traffic at 2 gigabits per second [32]. The alerts of suspicious traffic are monitored and analyzed in the IDS management consoles: the Main IDS Management console (Mgt-01) and the backup IDS console (Mgt-02). These alerts are stored in the IDS database of the DDH Attack Pattern Database for further analysis. The internal Virtual Private Network (VPN), Virtual Local Area Networks (VLANs) and subnets are separated from external traffic by the DMZ Firewalls Private Internet Exchange (PIX) firewalls [6] and internal firewalls Checkpoint FW-1 (CP Firewall); proxy servers, Internet Security Acceleration (ISA) servers), routers, load balancers, gateways and switches at the perimeter. The IDS logged over 100 gigabytes of 60 days of aggregated logs from the firewalls, IDSs, routers, load balancers, gateways, switches, and application and data server logs. These were analyzed for benign traffic by comparing them with the normal long-term characteristics in that network environment. The alerts were analyzed for benign traffic by comparing them with the normal long-term characteristics in that network environment. Analysis of the characteristics of the network traffic indicated a high number of false positives because much of the suspect traffic was actually from benign hosts. 7 Steps in Experimental Methods: Data Mining Analysis including Classification, Clustering, Genetic Algorithm, Pattern Generation and Analysis, Rule Induction and Statistical Analysis Pre-processing and Formatting the Datasets: Selection and Sorting of Attack/Intrusion or Normal Data Data Selection: initially, about 10% of 100 Gigabyte of the data from commercial environment of VPNs interfaces to broadband networks was selected at random for analysis. From this dataset, 40% was selected at random as training set and the remaining 60% was used as the test set. None of the cases in the training set was used for testing and vice-versa. Specific training cases were selected at random and exported into SPSS software [42] and Rosetta toolset [18] for analysis.

9 7.1 Subcategories and Distinctive Attacks Attributes The resultant summaries of the statistical analysis, correlations and commonly occurring attributes for each subcategory. These distinctive features of attributes for the various subcategories were analyzed to detect unknown attacks. A program was written to examine the efficiency and accuracies of the subcategories. 7.2 Analysis of attack types, categories and subcategories Suspect packets, both benign and malicious [2], are identified in terms of potential intrusion/attack types, categories and subcategories [32]. Since connections may be abnormal, the traffic from the source host that exhibits characteristics similar to these attacks can be isolated from the broadband network to the quarantine channels for analysis. Different packet types require different responses, such as divergence to hosts for Denial of Service (DOS) attacks [11] or responses from quarantine zone hosts with specific responses for buffer overflow attacks Attack types and categories The most current attack/intrusion types are as follows: statistical-anomaly, application-anomaly, protocolanomaly, multi-method-correlation, multi-flow-correlation, signature anomaly and threshold anomaly. See Table 1 below for their definitions. The corresponding attack categories for the most current attack/intrusion types are as follows: exploit, policy violation, reconnaissance and volume DOS and DDOS. The suspicious attack types and categories are more accurately defined through their subcategories. Since there are over 10,000 attacks with similar attributes [32], analysing their subcategories is more effective for rapid identification and appropriate response. Table 1. Attack types Attack Detection Types Description Example Statistical-anomaly A change in percentage Volume DOS Attacks composition of traffic flow statistical changes, e.g., Volume DOS attack. Application-anomaly Differences in applications SMTP: Too Many Commands codes, anomalies Protocol-anomaly Abnormal protocols, contents RADIUS Buffer Overflow headers and data segments Multi-method-correlation Multiple methods RLOGIN buffer overflows in correlated attacks Multi-flow-correlation Multiple packets ICMP Host Sweep in correlated attacks Signature Attacks identified by string patterns BACKDOOR Windows Shell exploit Threshold Attacks exceeding TCP Port Scan typical threshold values 8 intelligent infrastructure protection strategy for highly sensitive data on Broadband networks We analyze real broadband network traffic in a commercial environment consisting of Intrushield IDS [32]. The experiment consists of alert data collection and analysis in a network environment comprising

10 the following architecture (see Figure 2). The IDS consists of Network Associates Intrushield (NAI), IDS [32] for detecting attacks from external traffic, located at the Demilitarized Zone (DMZ), IDS-DMZ, and two main internal IDSs (NAI-I-4000 IDS), which detect internal attacks (IDS-4001 and 4002). The IDS sensors monitor traffic at 600 megabits per second and the I-4000 IDS sensors monitor traffic at 2 gigabits per second [32]. The alerts of suspicious traffic are monitored and analyzed in the IDS management consoles: the Main IDS Management console (Mgt-01) and the backup IDS console (Mgt-02). These alerts are stored in the IDS database of the DDH Attack Pattern Database for further analysis. The internal Virtual Private Network (VPN), Virtual Local Area Networks (VLANs) and subnets are separated from external traffic by the DMZ Firewalls Private Internet Exchange (PIX) firewalls [6] and internal firewalls Checkpoint FW-1 (CP Firewall); proxy servers, Internet Security Acceleration (ISA) servers), routers, load balancers, gateways and switches at the perimeter. The IDS logged over 100 gigabytes of alerts in 60 days. 8.1 Applying Data Mining Techniques Data Mining Techniques: The Data Mining Analysis involving Classification and Genetic Algorithm [18, 49] in Pattern Analysis for known attacks. Rule Induction using C5.0 [40], K-means clustering [13, 14] and the Genetic Algorithm for computing a fitness function [18, 49] were used for detection and analysis of categories and subcategories of anomaly patterns. For detection of subtle and complex attacks a Framework of Hybrid consisting of Rule Induction using Holte s 1R rule [16] and Statistical Analysis [17] were applied via the Rosetta toolset [18], followed by filtering for maximum support of conditional attributes to increase accuracies. Various cases of attack and normal classes were selected at random and algorithms were applied to each class type. This produces a set of decision rules or general patterns via minimal attribute subsets that distinguish on a per object basis. This is followed by filtering rules with maximum support for each class in order to obtain an optimum set of conditions for each ruleset for an attack/normal class. This was followed by development of matrix - table of conditions for each attribute in rulesets. Subsequently, for each attribute value if then rules were developed based on the attribute values each conditional ruleset. A program was written using the conditional rules from the Table (Matrix) of rulesets for each class of the specfied cases in the training data. Finally, there was validation of the accuracies of detection of class types using test data. See summary of Results in Table 2. 9 Preliminary Research and Results The preliminary research results for detection accuracies using various data mining techniques are shown in Table 2. The difference between a statistical anomaly and an exceeded threshold is that the statistical anomaly results in the pattern of traffic being abnormal to the normal patterns or values, such as the rate of normal traffic for TCP or UDP sessions directed to specific interfaces or IP addresses and subnets in a particular amount of time. This consists of multiple statistical factors deviating from the normal expected pattern. On the other hand, an exceeded threshold refers to a specifically pre-defined volume or quantity, such as the limit for acceptable levels of protocols that can be considered tolerable in a network. An example is a pre-defined amount of ICMP packets per second that can be defined for a network. 9.1 Statistical Techniques for Detecting Complex and Unknown Attacks The statistical techniques in this experiment involve statistical cross-correlation and analysis of relevant and critical attribute features in categories and subcategories of attack types. This was followed by statistical isolation of distinctive attribute features and pattern analysis of various attack subcategories.

11 Table 2. Results: Data Mining Techniques Accuracies Summary Data Mining Technique Number Training Accuracies Number of Testing Accuracy of Cases Cases K-means Clustering 34, % 47, % Cubits/C5.0 Rule Induction 40, % 79, % 1R Rule Induction 45, % 79, % Hybrid 1R Rule Induction and Filtering for Maximum Support Application of Hybrid to Real IDS Datasets-Application Security Features Application of Hybrid to Real Firewall Datasets- Network Security Features Correlation of Real IDS Datasets and Firewalls Security Features Application of Hybrid to Real TCP Attack Flags Security Protocol Features Application of Hybrid to Real Intruders Network Patterns Application of Hybrid Correlation of Statistical Anomaly and Signature Detection Analysis 2,422, % 3,334, % 11, % 21, % 10, % 14, % 18, % 29, % 11, % 21, % 2,422, % 3,334, % % 153, % The resulting model from the training sample of frequencies and occurrences of unique characteristics for subcategories of attacks used to identify unknown attacks in the test sample. The statistical correlation of categories and detection mechanism indicates that highest category is policy violation which consists largely of the signature detection mechanism, followed by protocol anomaly. See Figure 2. Although multi-flow correlation- reconnaissance is second highest to signature-policy violation attacks, overall, the exploits category exceeds the reconnaissance category, which comprises application and protocol anomalies and signature attacks. This is because exploits are major attacks while reconnaissance are preliminary probings. Volume DOS, comprising statistical anomalies, is the lowest attack category, since its effect is mostly disruption of service rather than gaining access to private data. 10 Research Agenda The general plan of work of this robust research is on critical US Cyber infrastructures protection involving the development of new approaches for secure transmission of highly sensitive data, carrying private, confidential and personally identifiable and customer and product class. The plan of work includes research, analysis, monitoring, evaluation, and reporting and development of effective security and privacy controls for transferring highly sensitive, private confidential customer and product involving secure transmission and verification US Cyber traffic as follows: 1. Development of new Cyber privacy controls transmission of highly sensitive data including trustworthy transaction processing, security policy specification, and discovery and implementation validation. 2. Development of embedded secure cyber monitoring, detection and response software filtering for counter measures against interception of highly sensitive data, carrying private, confidential and

12 Internal Subnets: partners/vpn Strategic Architecture for Datamining of Highly Sensitive Data: VPN, IDS, Firewalls, Gateways, DMZs and Subnets IDS-DMZ_in 150.x.x.x Gw-x.x.x.x I-2600 IDS-Mgt Console outgoing external packet filters F-5 5 Load Balancers F-5 5 Load Balancers External x x company.com VPN Concentrator proxy hosts Branches VLAN 20 VLAN 110 VLAN 120 VLAN 140 VLAN 40 VLAN 200 VLAN 205 DMZ VLAN 15 Dial in ISDN External subnet Internal subnet Internal subnet Pix firewall Internal subnet Proxy ISAserver wwwproxy.com Main IDS-01 I-4000 Gateway Main Corp Site Main IDS-02 I-4000 Gateway Main Corp Site traffic Internet traffic External Pix firewall IDS-DMZ_out 150.x.x.x Gw-x.x.x.x I-2600 Internal net CP CP Firewall Firewall Internal subnet Internal Gateways /switches Corp Remote Gateways /switches Subnet incoming external packet filters Gw Gw Gw traffic Gw Gw Gw Gw IDS-Remote_ I-2600 IDS-Remote_ I-2600 IDS-Remote_ I-2600 IDS-Remote_ I-2600 IDS-Remote_ I-1200 IDS-Remote_ I-1200 IDS-Remote_DR I-2600 Internet traffic External subnet Pix firewall DMZ Internal subnet External subnet Pix firewall DMZ Internal subnet External subnet Pix firewall DMZ Internal subnets External subnet Pix firewall DMZ Internal subnets External subnet IDS-DMZ x.x External Gateway IDS-DMZ x.x External Gateway IDS-DMZ x.x External Gateway IDS-DMZ x.x External Gateway Pix firewall DMZ IDS-DMZ x.x Internal subnet External subnet Pix firewall DMZ Internal subnets Subnet Pix firewall DMZ net , External Gateway External Gateway IDS-DMZ x.x External Gateway IDS-DMZ x.x Statistical Data Mining: Correlation of Categories and Detection Mechanism The Count field is the frequency of attacks in number of connections Detection Mechanism application-anomaly multi-flowcorrelation protocol-anomaly signature Count 0 statistical-anomaly threshold Exploit Policy Violation Reconnaissance Volume DoS category Data Mining.pdf Figure 2. Efficient Data Mining Analysis

13 personally identifiable and customer and product class information at intermediary points. 3. Filtering of interesting cyber packets, using correlation and aggregation of analysis of interception of autonomous backbone traffic. 4. Analysis and validation and verification of secure cyber transmission verification highly sensitive data for data protection, privacy and security controls. 5. Assessment of Secure Transmission Data Transmission over Shared Autonomous Networks, Multiple VPNs using same autonomous networks and Shared servicesdedicated lines and secure transmission control. 6. Data Mining of Astute Interception of Shared cyber and VPN traffic for anomaly and malicious patterns for automated responses. 7. Generation of new automatic of cyber security configurations and responses from abstract security policies and control specifications for international data transfer controls. 8. Specifications of security and privacy for international data transfer traceability of autonomous, Regional and US Cyber Networks, s, Backbone, VPN, WAN interfaces, including Extranets and Internets. 9. Testing and validation of effectiveness of new approaches against cyber eavesdropping and circumvention security and privacy specifications of highly sensitive data transfer traceability. 10. Development of effective cyber privacy and security controls responses for US cyber transmission and security vulnerabilities and attacks and Interception security and privacy specifications for international data transfer controls Design of Activities The design of activities to be undertaken include developing new embedded cyber monitoring and filtering detection mechanisms for interesting patterns of data flow, normal and anomaly patterns of data transfers and attack patterns for countermeasures against evasive interception of highly sensitive data, consisting of private, confidential and personally identifiable information for customers, consumers and products at intermediary points of cyber critical infrastructures. This includes specifications for new privacy definitions and control requirements in categories, subcategories and attribute types for secure transmission against interception of highly sensitive data and to ensure that information flow of highly sensitive data in complex systems comply with newly derived security and privacy policies and procedures. 11 Research, Education and Dissemination Timeline 11.1 Year 1: Effective evasive and intelligent attacks facing cyber security and protection In the first year, research, education and dissemination will consists of analysis, of current effective solutions to the evasive and intelligent attacks facing cyber security and protection. The research consists of developing new and effective embedded monitoring and filtering detection mechanisms, techniques and countermeasures against evasive interception of highly sensitive data, consisting of private, confidential and personally identifiable information for customers, consumers and products at intermediary

14 points of US cyber critical infrastructures. The research will examine and develop specifications for new privacy definitions and control requirements in categories, subcategories and attribute types for secure transmission against interception of highly sensitive data and to ensure that information flow of highly sensitive data in complex systems comply with newly derived security and privacy policies and procedures. This involves the development of new and effective techniques for validation and verification of effective implementation of these privacy specification controls based on new monitoring techniques for enforcement of security and privacy controls transparency, auditability, traceability accountability and traceability and cyber forensics and breaches assessments and notifications and preventions in critical infrastructures, applications and databases Year 2: Effective design of network and application security techniques and controls cybersecurity In the second year research, education and dissemination comprises effective design of network and application security techniques and controls for cybersecurity. This involves data acquisition on security parameters and configurations of complex network infrastructure architectures in commercial environments network topologies, interfaces, routing paths, tables, packet filters, access controls, etc. The aggregated logs will include data and application server logs, monitoring tools, including firewalls, IDS, aggregated systems. This will include data mining analysis using normal and anomaly detection using classification, clustering, rule-induction, genetic algorithms to distinguish between anomaly and normal traffic. Detection of patterns of astute attacks and design categories of automated responses to various classes of attack within data-intensive applications over evasive complex infrastructures. This will include analysis of code security vulnerabilities and attacks, prediction of paths of a complex attack and remediation response against such astute cyber attacks using both real-time and off-line analysis and intelligent humans-in-the-loop administrative controls and cross-layer responses for multiple categories, subcategories and features of malicious attacks and subversive attacks. The responses will include efficient and effective combination of automated responses and management of security mechanisms across a complex systems for updating security configurations and parameters and security controls using correlated and synchronized updates in firewalls, intrusion detection, prevention, monitoring and response systems against all classes cyber of attacks. This response will include security mechanisms adapted to the usability and skill levels of multiple user classes: average and skilled users, operators, administrators, forensic experts, research analysts, etc. This will be combined with effective responses to current and emerging complex attacks, using dynamic dispatch of security-enhancement measures and architectures, and integration of response security responses for various thresholds of attacks in multi-protocols of infrastructures hosting data-intensive applications across the Internet Year 3: Managing privacy, confidentiality and identity of highly sensitive data flow on US Broadband and Cyber Networks In the third year research, education and dissemination will consist of analysis of current effective solutions for managing privacy, confidentiality, and identity in cyberspace for information flow in US and complex systems and the Internet. The research will examine and provide solutions for the dilemma of communication in cyberspace that requires identity and certain degree of disclosure of personal information. This research will analyze broadband networks and web services that have become more pervasive and the types of collection and inference of personal information and the new problems for privacy preservation and the major challenge of security issues and privacy concerns. This includes analysis, research, design and specifications of security, trust and privacy in critical national infrastructures, applications, customer and consumer data, databases, mobile and sensor applications, data min-

15 ing, web services, digital libraries, in various industries including healthcare, medical, finance, banking, transportation, e-government and e-commerce, etc. The research will examine security and privacy for data-intensive applications, including US and geospatially interconnected systems and broadband networks, where data contents of personal identifiable information, identity class, customer class, etc. impose unique security requirements and introduce trade-offs between security and performance. The responses will include efficient and effective combination of automated responses and management of security mechanisms across a complex systems for updating security configurations and parameters and security controls using correlated and synchronized updates in firewalls, intrusion detection, prevention, monitoring and response systems against all classes cyber of attacks. This response will include security mechanisms adapted to the usability and skill levels of multiple user classes: average and skilled users, operators, administrators, forensic experts, research analysts, etc. This will be combined with effective responses to current and emerging complex attacks, using dynamic dispatch of security-enhancement measures and architectures, and integration of response security responses for various thresholds of attacks in multi-protocols of infrastructures for security, privacy, confidentiality, and identity in cyberspace. The research method will include assessments of real datasets that have been anonymized. The analysis for patterns and classes of private and sensitive data will involve data mining techniques including a combination of various algorithms from rule induction, classification, clustering, genetic algorithms, neural networks and other artificial intelligence techniques etc. These will be used to examine privacy-specific and privacy-related feature attribute sets of categories, classes subclasses and types data requiring unique security and privacy controls and specifications across federated or distributed systems. The datasets will include anonymized datasets from integrated data clusters, applications and databases hosting highly sensitive, confidential data with privacy and security requirements across international borders. The data mining analysis will be applied to feature significant attributes of data classes, subclasses of metadata content fields, sizes, parameters, and type of contents. These will be rated terms in proportion to the risks and requirements for US security and privacy regulatory compliance for both private and public sectors, including multi-national companies. This will result in the design of security control mechanisms includes new security, privacy, on to need-to-validate adequate effective controls for security and privacy. The method for responses to security breaches will include automatic generation of security configurations from policy specifications and validation and verification that information flow in complex systems comply with security and privacy policies. This will include measuring, modeling, analyzing, and validating system trust properties, such as the determination of the extensive efforts required by hackers to defeat security and privacy features Security Specifications for Privacy, Confidentiality and Identity in Cyber Trust for US Cyber standards The final response and security responses will include specifications for various classes and definitions of Privacy, Confidentiality, and Identity in Cyber Trust for US Cyber standards, and framework development. The final outcome will provide specifications for research areas of naming schemes for privacy and confidentiality; information hiding, anonymity and accountability, transparency; group identity and individual identity, privacy-enabling and disabling technologies; privacy policy monitoring; privacy and privacy-related metrics, integrated adaptable security solutions that combines verification and validation of identity and privacy; formal logics languages, models and methods for specifying and reasoning about privacy. These will include transformation of sensitive data and prevention of its association with particular individuals and utility of the data for research purposes. The transformation methods include generic and application-dependent for deducing ability of transformation methods to preserve utility and prevent the disclosure of sensitive data. Refer to example in Figure 1: Sample Classification Scheme for Transfer of Highly Sensitive Metadata consisting of Personally Identifiable Information Across International

16 Borders New Classification Scheme of Highly Sensitive Data with Sample New classification scheme for highly sensitive data for classes, subclasses, and field attributes for metadata and transfers and Master Data Management (MDM) across international borders across critical US infrastructures including Personally Identifiable Information (PII), Non-Public Personal Information (NPI), Health Patient Information (HPI), Customer, Consumer and Product data. See preliminary specifications of Security and Privacy for Highly Sensitive Data in Table 3 and examples of Privacy and Confidentiality attribute classifications in Table 4. Table 3. New Classification Scheme for International Transfer Highly Sensitive Metadata Confidentiality New Classification Traditional Classification New Highly Sensitive Sensitive Data Classification Metadata Classification Integrity Accu- Data racy Strictly Confidential Strictly Confidential Very High Very High Internal Group Confidential Confidential High Vital Use Only - Internal Internal Medium Sensitive Privacy and Security Privacy and Security Controls Not Applicable Public Domain Low Less Sensitive Table 4. Examples of New Classification Scheme for International Transfer Highly Sensitive Metadata Confidentiality Confidentiality Permission to View Data Top Confidentiality, Extremely Content Sensitive, Meta Data, Subclass Attributes Strictly Confidential Internal Group Confidential Use Only - Internal Use Only - Internal Categories of MDM Confidentiality Classification Examples of Customer and Personal Information Social Security Nos., Drivers Licenses, Credit Cards, Bank Accounts, Passports, Date of Birth Supervisor IDs, Medical IDs, Unique IDs, etc. Home Address, Group IDs, Company addresses, Phone Names, Biographies (Confidentiality based on countries, states) This will result in specifications, design and development of effective security features for applications, databases and critical infrastructures that transfer highly sensitive data in the presence of attacks more complex and disruptive than those currently observed across US Cyber and interfacing broadband networks to the Internet.

17 References [1] M. Asaka, A. Taguchi, and S. Goto. The implementation of ida: Intrusion detection agent system. In Proceedings of the FIRST Conference for IDA 1999, Brisbane, Australia, June [2] F. Baboescu and G. Varghese. Scalable packet classification. IEEE/ACM Transactions on Networking, 13(1):2 14, February [3] T. Bowen, D. Chee, and M. Segal. Building survivable systems: An integrated approach based on intrusion detection and damage containment. In IEEE Proceedings of the DARPA Information Survivability Conference and Exposition, volume II of II, pages IEEE Computer Society Press, [4] Cisco Systems Inc. NetRanger IDS and Software, San Jose, CA, USA, [5] Cisco Systems Inc. Cisco AS5301 Access Server and Software, version 2.28 and release updates, San Jose, CA, USA. [6] Cisco Systems Inc. Cisco PIX firewall 525 and Software, version 6.0, San Jose, CA, USA. [7] Cisco Systems Inc. Cisco Secure ACS for Windows, version 4.0, San Jose, CA, USA. [8] H. Debar and A. Wespi. Aggregation and correlation of intrusion-detection alerts. In Recent Advances in Intrusion Detection (RAID2001), volume 2212 of Lecture Notes in Computer Science, pages Springer-Verlag, Berlin, [9] K. Djahandari and D. Schackenberg. Coperative Intrusion Traceback and Response Architecture (CITRA). In Proceedings of the DARPA Information Survivability Conference and Exposition, DISCEX II 01, volume 1, June [10] H. Dreger, A. Feldmann, V. Paxson, and R. Sommer. Operational experiences with high-volume network intrusion detection. In Proceedings of the 2004 ACM workshop on Formal methods in security engineering, pages 2 11, Washington DC, USA, ACM Press. [11] V. D. Gligor. A note on the denial-of-service problem. In Proceedings of 1983 IEEE Symposium on Security and Privacy, pages , Oakland, CA, USA, April IEEE Computer Society Press. [12] S. E. Hansen and T. Atkins. Automated system monitoring and notification with swatch. In Proceedings of the USENIX Systems Administration (LISA VII) Conference, pages , Stanford University, CA, USA, November USENIX. [13] J. A. Hartigan. Clustering Algorithms. John Wiley and Sons, Inc., New York, USA, [14] J. A. Hartigan and M. A. Wong. A k-means clustering algorithm. Applied Statistics, 128(3): , July September [15] G. Helmer, J. Wong, V. Honavar, and L. Miller. Intelligent agents for intrusion detection. In Proceedings of the 2003 IEEE Information Technology Conference, pages , Syracuse, NY, USA, September IEEE Computer Society Press. [16] R. C. Holte. Very simple classification rules perform well on most commonly used datasets. Machine Learning, 11:63 90, [17] R. C. Holte, A. L., and B. W. Porter. Concept learning and the problem of small disjuncts. In Proceedings of the Eleventh International Joint Conference on Artificial Intelligence, pages , San Mateo, CA, [18] A. hrn. Discernibility and Rough Sets in Medicine: Tools and Applications. PhD thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, aleks/thesis. [19] K. Iglun. Ustat: A real-time intrusion detection system for unix. In Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy, pages 16 28, Oakland, CA, USA, IEEE Computer Society Press. [20] C. Iheagwara, A. Blyth, and M. Singhal. A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment. Journal of Computer Security, 11(1):1 33, [21] Y. F. Jou, F. Gong, C. Sargor, X. Wu, S. F. Wu, H.-C. Chang, and F.-y. Wang. Design and implementation of a scalable intrusion detection system for the protection of network infrastructure. In IEEE Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX 00), volume 2, pages IEEE Computer Society Press, January [22] G. Koutepas, F. Stamatelopoulos, and B. S. Maglaris. Distributed management architecture for cooperative detection and reaction to DDoS attacks. IEEE/ACM Transactions on Networking, 12(1):73 94, March 2004.

18 [23] C. Kruegel, T. Toth, and E. Kirda. A security policy reinforcement tool for large networks. In Proceedings of IFIP Conference on Advances in Network and Distributed Systems Security, Boston, MA, USA, November Kluwer Academic Publishers. [24] C. Kruegel, T. Toth, and E. Kirda. Decentralized event correlation for intrusion detection. In Proceedings of International Conference on information Security and cryptology, volume Lecture Notes in Computer Science 2288, Berlin, Germany, December Springer-Verlag, Berlin. [25] S. Kumar. Classification and Detection of Intrusions. PhD thesis, Purdue University, [26] S. Kumar and E. H. Spafford. A pattern-matching model for misuse intrusion detection. In Proceedings of the National Computer Security Conference, October [27] M. V. Mahoney and P. K. Chan. An analysis of the 1999 DARPA Lincoln Laboratory evaluation data for network anomaly detection. In Recent Advances in Intrusion Detection (RAID2003), volume 2820 of Lecture Notes in Computer Science, pages Springer-Verlag, Berlin, [28] B. Morin, L. Me, H. Debar, and M. Ducasse. M2D2: A formal data model for IDS alert correlation. In Recent Advances in Intrusion Detection (RAID2002), volume 2515 of Lecture Notes in Computer Science, pages , Zurich, Switzerland, 16 18, October Springer-Verlag, Berlin. [29] Network Associates. Blackice IDS, Herndon, Virginia, USA, [30] Network Associates. Internet Security Systems (ISS) Real Secure IDS, version 6.5, 7.0, Herndon, Virginia, USA, [31] Network Associates. McAfee Intrushield IDS: 4000 Series, Santa Clara, CA, USA. [32] Network Associates. McAfee Intrushield IDS: 4000 Series, Santa Clara, CA, USA. [33] Network Flight Recorder. Network Flight Recorder (NFR) IDS, [34] V. Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31(23 24): , [35] K. L. Petersen. IDA: Intrusion Detection Alert. In Proceedings of the IEEE Annual International Computer Software and Applications Conference, pages IEEE Computer Society Press, September [36] L. Portnoy, E. Eskin, and S. Solfo. Intrusion detection with unlabelled data using clustering. In Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001), pages , [37] T. H. Ptacek and T. N. Newsham. Insertion, evasion and denial of service: Eluding network intrusion detection. Technical Report, Secure Networks (McAfee) Inc., Santa Clara, CA, USA, January [38] M. J. Ranum, K. Landfield, M. Stolarchuk, M. Sienkiewicz, A. Lambeth, and E. Wall. Implementing a generalized tool for network monitoring. In Proceedings of the Eleventh Systems Administration Conference (LISA 97), San Diego, CA, USA, October [39] M. Roesch. Snort: Lightweight intrusion detection for networks. In USENIX Lisa-99, pages USENIX, [40] Rulequest Research. Rule Induction with C5.0, See5/Cubist software, [41] S. R. Snapp, J. Brentano, G. V. Dias, T. L. Goan, L. T. Heberlein, C.-l. Ho, K. N. Levitt, B. Mukherjee, S. E. Smaha, T. Grance, D. M. Teal, and D. Mansur. DIDS (Distrubted intrusion detection system): Motivation, architecture and an early prototype. In Proceedings of the 14th National Security Conference, pages , October [42] SPSS Inc. SPSS Statistical Software, Chicago, IL, USA, [43] S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip, and D. Zerkle. Grids: A graph-based intrusion detection sysyem for large networks. In Proceedings of the 20th National Information Systems Security Conference, volume 1, pages National Computer Security Centre Press, October [44] Symantec Corporation. Norton Internet Security and Symantec Host IDS, Cupertino, CA, USA, [45] T. F. Toth. Improving Intrusion Detection Systems. PhD thesis, Technical University of Vienna, [46] Touch Technologies Inc. Touch Technologies INSA IDS, San Diego, CA, USA, [47] G. Vigna, S. Eckmann, and R. A. Kemmerer. The stat tool suite. In Proceedings of DISCEX 2000, pages IEEE Computer Society Press, January [48] G. Vigna and R. A. Kemmerer. Netstat: A network-based intrusion detection system. In Proceedings of the 14th Annual Computer Security Applications Conference, December [49] S. Vinterbo and A. hrn. Minimal approximate hitting sets and rule templates. International Journal of Approximate Reasoning, 25(2): , 2000.

Dr. Emmanuel Hooper, PhD, PhD, PhD Presentation title SUB TITLE HERE National Broadband Plan Public Safety and Homeland Security Workshop

Dr. Emmanuel Hooper, PhD, PhD, PhD Presentation title SUB TITLE HERE National Broadband Plan Public Safety and Homeland Security Workshop Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Harvard University, Leadership for Networked World Global Information Intelligence: http://globalinfointel.com SUB

More information

INTRUSION DETECTION SYSTEMS and Network Security

INTRUSION DETECTION SYSTEMS and Network Security INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013 CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1 Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches

More information

SCADA SYSTEMS AND SECURITY WHITEPAPER

SCADA SYSTEMS AND SECURITY WHITEPAPER SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of

More information

On-Premises DDoS Mitigation for the Enterprise

On-Premises DDoS Mitigation for the Enterprise On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has

More information

Firewall Security. Presented by: Daminda Perera

Firewall Security. Presented by: Daminda Perera Firewall Security Presented by: Daminda Perera 1 Firewalls Improve network security Cannot completely eliminate threats and a=acks Responsible for screening traffic entering and/or leaving a computer network

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

How To Protect Your Network From Attack

How To Protect Your Network From Attack Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Internet (In)Security Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: stephan.gross@tu-dresden.de

More information

How To Protect Your Network From Attack From Outside From Inside And Outside

How To Protect Your Network From Attack From Outside From Inside And Outside IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion

More information

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

8. Firewall Design & Implementation

8. Firewall Design & Implementation DMZ Networks The most common firewall environment implementation is known as a DMZ, or DeMilitarized Zone network. A DMZ network is created out of a network connecting two firewalls; i.e., when two or

More information

Securing SIP Trunks APPLICATION NOTE. www.sipera.com

Securing SIP Trunks APPLICATION NOTE. www.sipera.com APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)

More information

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..

More information

HANDBOOK 8 NETWORK SECURITY Version 1.0

HANDBOOK 8 NETWORK SECURITY Version 1.0 Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: assist@dsd.gov.au HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives

More information

Firewalls and Intrusion Detection

Firewalls and Intrusion Detection Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc. Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013 CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access

More information

What would you like to protect?

What would you like to protect? Network Security What would you like to protect? Your data The information stored in your computer Your resources The computers themselves Your reputation You risk to be blamed for intrusions or cyber

More information

SOLUTION GUIDE. Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management.

SOLUTION GUIDE. Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management. SOLUTION GUIDE Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management. North America Radware Inc. 575 Corporate Dr Suite 205 Mahwah, NJ 07430

More information

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN) MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) : Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh Written Exam in Network Security ANSWERS May 28, 2009. Allowed aid: Writing material. Name (in block letters)

More information

Network Security Topologies. Chapter 11

Network Security Topologies. Chapter 11 Network Security Topologies Chapter 11 Learning Objectives Explain network perimeter s importance to an organization s security policies Identify place and role of the demilitarized zone in the network

More information

Achieving PCI Compliance Using F5 Products

Achieving PCI Compliance Using F5 Products Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity

More information

Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems

Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems Page 1 of 5 Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems In July the Payment Card Industry Security Standards Council (PCI SSC) published

More information

This chapter covers the following topics:

This chapter covers the following topics: This chapter covers the following topics: Components of SAFE Small Network Design Corporate Internet Module Campus Module Branch Versus Headend/Standalone Considerations for Small Networks C H A P T E

More information

Security Awareness. Wireless Network Security

Security Awareness. Wireless Network Security Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition

More information

Deploying Firewalls Throughout Your Organization

Deploying Firewalls Throughout Your Organization Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Network Defense Tools

Network Defense Tools Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds ravikantvanjara@gmail.com What is Firewall? A firewall

More information

IDS / IPS. James E. Thiel S.W.A.T.

IDS / IPS. James E. Thiel S.W.A.T. IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods

More information

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,

More information

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the

More information

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order

More information

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005 State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

Radware s Behavioral Server Cracking Protection

Radware s Behavioral Server Cracking Protection Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information

More information

Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49. Firewall Design Principles

Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49. Firewall Design Principles Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls

More information

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

More information

Complete Protection against Evolving DDoS Threats

Complete Protection against Evolving DDoS Threats Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

SECURING AN INTEGRATED SCADA SYSTEM. Technical Paper April 2007

SECURING AN INTEGRATED SCADA SYSTEM. Technical Paper April 2007 SECURING AN INTEGRATED SCADA SYSTEM Network Security & SCADA Systems Whitepaper Technical Paper April 2007 Presented by: Scott Wooldridge Managing Director of Oceania Citect 1 Abstract This paper discusses

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

Developing Network Security Strategies

Developing Network Security Strategies NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network

More information

ICANWK406A Install, configure and test network security

ICANWK406A Install, configure and test network security ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with

More information

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES SECURITY

More information

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer Joseph Migga Kizza A Guide to Computer Network Security 4) Springer Contents Part I Understanding Computer Network Security 1 Computer Network Fundamentals 1.1 Introduction 1.2 Computer Network Models

More information

Efficient and Intelligent Network Infrastructure Protection Strategies for Complex Attacks, IDS Evasions, Insertions and Distributed Denial of Service

Efficient and Intelligent Network Infrastructure Protection Strategies for Complex Attacks, IDS Evasions, Insertions and Distributed Denial of Service Efficient and Intelligent Network Infrastructure Protection Strategies for Complex Attacks, IDS Evasions, Insertions and Distributed Denial of Service Emmanuel Hooper Information Security Group University

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

Taxonomy of Intrusion Detection System

Taxonomy of Intrusion Detection System Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use

More information

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology

More information

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow IDS 4.0 Roadshow Module 1- IDS Technology Overview Agenda Network Security Network Security Policy Management Protocols The Security Wheel IDS Terminology IDS Technology HIDS and NIDS IDS Communication

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

Network Access Security. Lesson 10

Network Access Security. Lesson 10 Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

Securing E-Commerce. Agenda. The Security Problem IC Security: Key Elements Designing and Implementing. 3203 1346_06_2000_c1_sec3

Securing E-Commerce. Agenda. The Security Problem IC Security: Key Elements Designing and Implementing. 3203 1346_06_2000_c1_sec3 Securing E-Commerce 1 Agenda The Security Problem IC Security: Key Elements Designing and Implementing 2 The Security Dilemma Internet Business Value Internet Access Corporate Intranet Internet Presence

More information

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,

More information

General Network Security

General Network Security 4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those

More information

A Model-based Methodology for Developing Secure VoIP Systems

A Model-based Methodology for Developing Secure VoIP Systems A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN

More information

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How Network Security Is Breached Network Security Policy

More information

COMPUTER SECURITY. J. Magalhães Cruz Computer Security Protection of Local Systems (short) 1 25

COMPUTER SECURITY. J. Magalhães Cruz Computer Security Protection of Local Systems (short) 1 25 COMPUTER SECURITY 9. Protection of local systems (2) Goal (2) Actions to take (3) Protection by Prevention in Local Networks (LAN Protection) (4) Definitions (5) Firewall devices (corta fogos): traffic

More information

Guideline on Firewall

Guideline on Firewall CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June

More information

BlackRidge Technology Transport Access Control: Overview

BlackRidge Technology Transport Access Control: Overview 2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service

More information

SCADA/Business Network Separation: Securing an Integrated SCADA System

SCADA/Business Network Separation: Securing an Integrated SCADA System SCADA/Business Network Separation: Securing an Integrated SCADA System This white paper is based on a utility example but applies to any SCADA installation from power generation and distribution to water/wastewater

More information

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

IntruPro TM IPS. Inline Intrusion Prevention. White Paper IntruPro TM IPS Inline Intrusion Prevention White Paper White Paper Inline Intrusion Prevention Introduction Enterprises are increasingly looking at tools that detect network security breaches and alert

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center Intrusion Prevention and Detection No: Effective: OSC-12 5/21/09 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original

More information

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

State of Texas. TEX-AN Next Generation. NNI Plan

State of Texas. TEX-AN Next Generation. NNI Plan State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...

More information

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key

More information

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia jason.lawrence@ey.com Twitter: @ethical_infosec

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia jason.lawrence@ey.com Twitter: @ethical_infosec Introduction Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia jason.lawrence@ey.com Twitter: @ethical_infosec More than 20 years of experience in cybersecurity specializing

More information

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure Bendigo and Adelaide Bank Ltd Security Incident Response Procedure Table of Contents 1 Introduction...1 2 Incident Definition...2 3 Incident Classification...2 4 How to Respond to a Security Incident...4

More information

Introduction p. 2. Introduction to Information Security p. 1. Introduction

Introduction p. 2. Introduction to Information Security p. 1. Introduction Introduction p. xvii Introduction to Information Security p. 1 Introduction p. 2 What Is Information Security? p. 3 Critical Characteristics of Information p. 4 CNSS Security Model p. 5 Securing Components

More information

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls CEN 448 Security and Internet Protocols Chapter 20 Firewalls Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University mdahshan@ccis.ksu.edu.sa

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Chapter 15. Firewalls, IDS and IPS

Chapter 15. Firewalls, IDS and IPS Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet

More information

How To Protect A Network From Attack From A Hacker (Hbss)

How To Protect A Network From Attack From A Hacker (Hbss) Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment

More information

Information Security: A Perspective for Higher Education

Information Security: A Perspective for Higher Education Information Security: A Perspective for Higher Education A By Introduction On a well-known hacker website, individuals charged students $2,100 to hack into university and college computers for the purpose

More information

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

THE ROLE OF IDS & ADS IN NETWORK SECURITY

THE ROLE OF IDS & ADS IN NETWORK SECURITY THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems (IDS) Presented by Erland Jonsson Department of Computer Science and Engineering Contents Motivation and basics (Why and what?) IDS types and detection principles Key Data Problems

More information

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples The

More information

Overview. Firewall Security. Perimeter Security Devices. Routers

Overview. Firewall Security. Perimeter Security Devices. Routers Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security

More information